πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ John McAfee Indicted on Tax Charges πŸ•΄

The indictment alleging tax evasion and failure to file returns was unsealed after his arrest in Spain.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26572 β€Ό

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26571 β€Ό

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5632 β€Ό

InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Recon Informer 1.2 πŸ› 

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

πŸ“– Read

via "Packet Storm Security".
⚠ Gone phishing: workplace email security in five steps ⚠

David Mitchell, Senior Director of Email Product Management at Sophos, shares his top tips to optimize workplace email security.

πŸ“– Read

via "Naked Security".
❌ Unpatched Apple T2 Chip Flaw Plagues Macs ❌

A researcher claims that the issue can be exploited by attackers in order to gain root access.

πŸ“– Read

via "Threat Post".
πŸ•΄ 6 Best Practices for Using Open Source Software Safely πŸ•΄

Open source software is critical yet potentially dangerous. Here are ways to minimize the risk.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-25613 β€Ό

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23832 β€Ό

A Persistent Cross-Site Scripting (XSS) vulnerability in message_admin.php in Projectworlds Car Rental Management System v1.0 allows unauthenticated remote attackers to harvest an admin login session cookie and steal an admin session upon an admin login.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to defend your organization against the surge in ransomware attacks 🦿

Ransomware attacks doubled in the US over the last three months, says Check Point Research.

πŸ“– Read

via "Tech Republic".
❌ APT Attack Injects Malware into Windows Error Reporting ❌

The fileless attack uses a phishing campaign that lures victims with information about a worker’s compensation claim.

πŸ“– Read

via "Threat Post".
❌ COVID-19 Clinical Trials Slowed After Ransomware Attack ❌

The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the incident.

πŸ“– Read

via "Threat Post".
πŸ” What is ITAR Compliance? 2020 ITAR Regulations, Fines, Certifications & More πŸ”

Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Malware for Ad Fraud Gets More Sophisticated πŸ•΄

Facebook says SilentFade campaign disabled notifications that could have warned users that their accounts had been compromised.

πŸ“– Read

via "Dark Reading".
⚠ Naked Security Podcast – we’re back for Series 3! ⚠

Join us weekly for the Naked Security Podcast - back for Series 3 and available wherever good podcasts are found!

πŸ“– Read

via "Naked Security".
❌ Microsoft Zerologon Flaw Under Attack By Iranian Nation-State Actors ❌

Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-25742 β€Ό

pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25803 β€Ό

Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.

πŸ“– Read

via "National Vulnerability Database".
🦿 Wi-Fi security: FBI warns of risks of using wireless hotel networks 🦿

Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.

πŸ“– Read

via "Tech Republic".
πŸ›  Lynis Auditing Tool 3.0.1 πŸ› 

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

πŸ“– Read

via "Packet Storm Security".